Container Vulnerability Schema Change
- Original Schema
scanID string scantime Epoch timestamp clusterID string clusterName string imageID string registry string repository string imageDigest string vulnerabilityname string description string softwarelist Array of objects cveLink string cverecord: - id
- publishedDateTime
- exploitAttemptCount (Optional)
- globalExploitActivityLevel (Optional)
- cvssScore
- protectionRules (Optional)
Object - New Schema
scantime Epoch timestamp scanID string clusterID string clusterName string imageID string registry string repository string imageDigest string vulnerabilityname string description string softwarelist Array of objects cveLink string cverecord: - id
- publishedDateTime
- exploitAttemptCount (Optional)
- globalExploitActivityLevel (Optional)
- cvssScore
- protectionRules (Optional)
Object
Export Assets Report Schema change
- Original Schema
projectID string projectName string customAssetTags Object platformAssetTags Object clusterID string clusterType string clusterTypeDetail string imageID string imageName string imageVersion string imageDigest string imageRegistry string imageAnnoations Object containerInfo Object scanTime string - New Schema
scantime Epotch timestamp projectID string projectName string customAssetTags Object platformAssetTags Object clusterID string clusterType string clusterTypeDetail string imageID string imageName string imageVersion string imageDigest string imageRegistry string imageAnnoations Object containerInfo Object scanTime (deprecated, may be removed in future) string
Trend Micro advises customers to pay attention to the possible impact of the log changes to their configured Splunk HEC and AWS S3 connectors.